SecWiki周刊(第322期)
2020/04/27-2020/05/03
安全资讯
安全技术
beholder:一款监控端口变化的系统
https://github.com/zj1244/beholder_scanner
https://github.com/zj1244/beholder_scanner
《网络安全审查办法》要点解读
https://www.freebuf.com/news/235177.html
https://www.freebuf.com/news/235177.html
Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS
https://securitygossip.com/blog/2020/04/21/kobold-evaluating-decentralized-access-control-for-remote-nsxpc-methods-on-ios/
https://securitygossip.com/blog/2020/04/21/kobold-evaluating-decentralized-access-control-for-remote-nsxpc-methods-on-ios/
谈谈工作和学习中,所谓的主动性
https://mp.weixin.qq.com/s/qB9phQwF8NulwSGINQz3yA
https://mp.weixin.qq.com/s/qB9phQwF8NulwSGINQz3yA
Mimikatz的18种免杀姿势及防御策略(上)
https://mp.weixin.qq.com/s/CiOaMnJBcEQfZXV_hopzLw
https://mp.weixin.qq.com/s/CiOaMnJBcEQfZXV_hopzLw
How to hook Android Native methods with Frida (Noob Friendly) |
https://erev0s.com/blog/how-hook-android-native-methods-frida-noob-friendly/
https://erev0s.com/blog/how-hook-android-native-methods-frida-noob-friendly/
在网络安全领域应用机器学习的困难和对策
https://mp.weixin.qq.com/s/j7vuiAWz6kY4ePsjb5EtDw
https://mp.weixin.qq.com/s/j7vuiAWz6kY4ePsjb5EtDw
短信身份验证的安全风险
https://xz.aliyun.com/t/7638
https://xz.aliyun.com/t/7638
企业快速实践部署IAST/RASP的一种新思路
https://www.freebuf.com/articles/es/235441.html
https://www.freebuf.com/articles/es/235441.html
在Kali Linux 2020系统中安装、配置和使用cuckoo沙箱
https://www.freebuf.com/sectool/234251.html
https://www.freebuf.com/sectool/234251.html
相信技术的力量 - RSAC 2020 (2)
https://mp.weixin.qq.com/s/C_qQtuisG0NVcwad4y0BqQ
https://mp.weixin.qq.com/s/C_qQtuisG0NVcwad4y0BqQ
SonarQube实现自动化代码扫描
https://mp.weixin.qq.com/s/L5WeEFvu6etVTAigx6jjcQ
https://mp.weixin.qq.com/s/L5WeEFvu6etVTAigx6jjcQ
Fortify: 源代码漏洞の审计
https://github.com/wooyunwang/Fortify
https://github.com/wooyunwang/Fortify
2019年网络安全报告精选
https://mp.weixin.qq.com/s/YCSuRXhiFYGaE-f3_C8l5A
https://mp.weixin.qq.com/s/YCSuRXhiFYGaE-f3_C8l5A
利用Cloudflare Worker来隐藏C2基础设施
https://www.freebuf.com/sectool/232555.html
https://www.freebuf.com/sectool/232555.html
Mimikatz的18种免杀姿势及防御策略(下)
https://mp.weixin.qq.com/s/0p88rj-tWClLa_geKMkPgw
https://mp.weixin.qq.com/s/0p88rj-tWClLa_geKMkPgw
WebShell通用免杀的思考
https://mp.weixin.qq.com/s/GjAPqrpMT6cHwkWTRjUu1Q
https://mp.weixin.qq.com/s/GjAPqrpMT6cHwkWTRjUu1Q
西门子 PLC S7-1500 漏洞分析与复现(附演示视频)
https://paper.seebug.org/1189/
https://paper.seebug.org/1189/
Fastjson反序列化进攻利用
https://mp.weixin.qq.com/s/i7-g89BJHIYTwaJbLuGZcQ
https://mp.weixin.qq.com/s/i7-g89BJHIYTwaJbLuGZcQ
SecWiki周刊(第321期)
https://www.sec-wiki.com/weekly/321
https://www.sec-wiki.com/weekly/321
Spring Boot Actuator 漏洞利用
https://mp.weixin.qq.com/s/q0y2WNIhkmR88Mdpyv4_QQ
https://mp.weixin.qq.com/s/q0y2WNIhkmR88Mdpyv4_QQ
Joystick :transform the ATT&CK Evaluations data into concise views
https://github.com/mitre-attack/joystick
https://github.com/mitre-attack/joystick
在注册时检测社交网络中的虚假账户—以Wechat为例
https://mp.weixin.qq.com/s/DYYvjF6Rx1Xg7PVB80EKKA
https://mp.weixin.qq.com/s/DYYvjF6Rx1Xg7PVB80EKKA
基于大数据的Uber数据实时监控(Prat 3:使用Vert.x的实时仪表盘)
https://mp.weixin.qq.com/s/ARz1tytLWwkAlFA4XV-MYA
https://mp.weixin.qq.com/s/ARz1tytLWwkAlFA4XV-MYA
西门子S7comm协议Read SZL解析
http://blog.nsfocus.net/s7comm-readszl-0427/
http://blog.nsfocus.net/s7comm-readszl-0427/
基于大数据的Uber数据实时监控(Part 1:Spark机器学习)
https://mp.weixin.qq.com/s/mr-007pdIzOXPDaAUha1Ww
https://mp.weixin.qq.com/s/mr-007pdIzOXPDaAUha1Ww
LeetHozer Botnet分析报告
https://blog.netlab.360.com/the-leethozer-botnet/
https://blog.netlab.360.com/the-leethozer-botnet/
COVID-19攻击手段与数据分析
https://mp.weixin.qq.com/s/C_BN96qI9Wb96KcyqXb4_Q
https://mp.weixin.qq.com/s/C_BN96qI9Wb96KcyqXb4_Q
基于大数据的Uber数据实时监控(Part 2:Kafka和Spark Streaming)
https://mp.weixin.qq.com/s/GAHYECAWLvOob7TSQHHaiQ
https://mp.weixin.qq.com/s/GAHYECAWLvOob7TSQHHaiQ
CVE-2020-0932: remote code execution on microsoft sharepoint
https://www.zerodayinitiative.com/blog/2020/4/28/cve-2020-0932-remote-code-execution-on-microsoft-sharepoint-using-typeconverters
https://www.zerodayinitiative.com/blog/2020/4/28/cve-2020-0932-remote-code-execution-on-microsoft-sharepoint-using-typeconverters
Patchguard: Detection of Hypervisor Based Introspection [P2]
https://revers.engineering/patchguard-detection-of-hypervisor-based-instrospection-p2/
https://revers.engineering/patchguard-detection-of-hypervisor-based-instrospection-p2/
The DGA of Zloader
https://johannesbader.ch/blog/the-dga-of-zloader/
https://johannesbader.ch/blog/the-dga-of-zloader/
渗透利器Cobalt Strike在野利用情况专题分析
https://mp.weixin.qq.com/s/Agr3doBvYMK6Bs0tH6urcw
https://mp.weixin.qq.com/s/Agr3doBvYMK6Bs0tH6urcw
Patchguard: Detection of Hypervisor Based Instrospection [P1]
https://revers.engineering/patchguard-detection-of-hypervisor-based-instrospection-p1/
https://revers.engineering/patchguard-detection-of-hypervisor-based-instrospection-p1/
Linux 内核内存管理与漏洞利用
https://paper.seebug.org/1153/
https://paper.seebug.org/1153/
Rick教你写shellcode系列之邪恶的pdf
https://xz.aliyun.com/t/7684
https://xz.aliyun.com/t/7684
-----微信ID:SecWiki-----
SecWiki,13年来一直专注安全技术资讯分析!
SecWiki:https://www.sec-wiki.com
本期原文地址: SecWiki周刊(第322期)
